|
||||||
|
||
|
Home > Lock file software |
Related keywords: file, lock, File, file transfer, file management, file encryption, file manager, file sharing, file backup, FILE |
|
|
1. | G-Lock SpamCombat 2.61 (glocksoft.com) | ||
impossible to use email without receiving spam in large amounts. G-Lock SpamCombat is your powerful solution for clearing your Inbox from spam, virus, and junk emails. G-Lock SpamCombat is email filtering software that lets you eliminate all unwanted messages at the server level without | |||
Updated: 3, 2006 | Rating: 16 | Author: Alex Markov | Size: 4209 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
2. | PowrClik Suite 2.7.4.104 (genntt.webs.com.ua) | ||
computer. Additional functions: run screen saver, turn off monitor, lock computer, hang up modem connection, run Task Scheduler, run file, play sound on alarm, measure performance. Preventive functions: disable screen saver, prevent suspend mode activation, prevent Windows shut down. And much | |||
Updated: 3, 2006 | Rating: 1651 | Author: Genntt Productions | Size: 315 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
3. | Super Utilities 6.25 (superlogix.net) | ||
in protecting and securing sensitive information. You can hide or lock folders, clean your system tracks, password-protect applications that hold sensitive data, quickly and securely delete files, and hide IE Favorites and Start menu items from view. 3.System Maintenance will help automate computer maintenance jobs to keep it smooth, fast, and error free. It includes Task | |||
Updated: 3, 2006 | Rating: 16 | Author: li jiangnan | Size: 3328 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
4. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Nobody, not even your wife, boss, or a hacker would | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | EXECryptor 2.3.7 (softcomplete.com) | ||
(12-16 characters). A serial number can be time-limited, may be locked to Hardware ID, can contain encrypted registration information such as license type, allowed features and other user defined information. It supports black list database of 'stolen' illegal keys. EXECryptor uses cryptographically strong serial number generation algorithm that compmletely prevents | |||
Updated: 2, 2006 | Rating: 140 | Author: Alex Sergeev | Size: 2865 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
6. | SQLExecMS 2.6 (laplas-soft.com) | ||
server performance counters;Check utilization of proc cache;Watch locks; Review space used by DB files, tables and indexes; Manage DB file and filegroups;Turn on and off trace flags;Manage scheduled jobs; Change SQL server and database options;Backup and restore databases; Analyze | |||
Updated: 2, 2006 | Rating: 433 | Author: Oleg Dantchenko | Size: 4928 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
7. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | Sleep Timer Pro 4.8.2 (what-the.net) | ||
Sleep Timer Pro is an all-in-one System Utility to automate the use of your system. With Sleep Timer you may shutdown, reboot, or set an alarm all with a few clicks of the mouse. Set your time in intervals like 15,30,45,60,90 minutes. Version 3.x+ now includes Clock Syncronization to GMT/Navy Clock in minute | |||
Updated: 2, 2006 | Rating: 61 | Size: 4813 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
9. | FineBrowser 3.2.25 (finebrowser.com) | ||
You can change the order of the window tabs by using drag&drop, lock the important windows from accidental close and rename them with ease. The powerful bookmarks manager offers advanced management features, personal page ratings, comments, grouped favorites and more. FineBrowser is designed to work with image archive, wich is organized by the program using different sources | |||
Updated: 2, 2006 | Rating: 76 | Author: Alex Akimov | Size: 3415 kb | Shareware Go to category: Network & Internet > Browsers Similar programs | |||
10. | 1st Privacy Tool for Windows 4.9.2.2 (privacywindows.com) | ||
program can log WHO and WHEN uses your computer to the special log file , so you always know who has used your computer. The administrator password prevents anybody to run the program and change settings and uninstall the program. The 'Import/Export' function helps you set up the same settings on | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1500 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
11. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
12. | Password Maintenance 2.07 (softdd.com) | ||
external device to better secure your passwords, as your password files will not even exist on your pc if you choose this option. You can also print a list of all your passwords and websites on paper for safe backup storage, and you can add, update, and delete websites and passwords in your list. You | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftDD Software | Size: 535 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
13. | Secure Image Express 4.0 (artistscope.com) | ||
the images on your web site using image encryption and domain lock. Secure Image uses image encryption with Domain Lock to prevent direct saving, right mouse saving, direct downloading and bandwidth theft. Options include targeted hyperlink on the image, status bar and image settings for downloading messages and border frames. Instead of placing a normal image onto the | |||
Updated: 2, 2006 | Rating: 0 | Author: William Kent | Size: 948 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
14. | Mp3 Filter 4.2.4 (hardcoded.net) | ||
your collection is: Hard drives, Multiple Mp3 CDs, anything. The file comparison process, which basically compare filename's words between them, is completely customizable. Mp3 Filter also have tons of other features: * Profile driven scans. * Incredibly fast comparing engine. * Supports MP3, WMA, OGG, M4A/M4P (iTunes format). * Easy to use profile | |||
Updated: 2, 2006 | Rating: 1578 | Author: Virgil Dupras | Size: 1083 kb | Shareware Go to category: Audio & Multimedia > Audio File Players Similar programs | |||
15. | FineBrowser Free 3.2.24 (finebrowser.com) | ||
You can change the order of the window tabs by using drag&drop, lock the important windows from accidental close and rename them with ease. The powerful bookmarks manager offers advanced management features, personal page ratings, comments, grouped favorites and more. FineBrowser is designed to work with image archive, wich is organized by the program using different sources | |||
Updated: 2, 2006 | Rating: 16 | Author: Alex Akimov | Size: 3958 kb | Freeware Go to category: Network & Internet > Browsers Similar programs | |||
16. | Instant Remote Control 2.2.9 (omniquad.com) | ||
multiple licenses-requires to be installed only on the administrator's computers used to control other PCs-a single license can support large networks-no warning displayed at remote end-creates a tree of all computers on your network automatically-manually enter IP details and access PCs not listed as well-works by sending a preconfigured host to a would-be host machine-the host | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Sobstel | Size: 2341 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
17. | WiseTerm Telnet/Serial (32-bit) 3.1.2 (johnnypops.demon.co.uk) | ||
tab-stops; char, line, column, rectangle clear/fill functions; line locking; answerback; monitor mode; line drawing; remotely switchable emulation. Supports session logging. Includes a modem dialer and a simple phonebook. When using telnet, you can use your host file, or an edited version of your host file, as a machine directory. Includes printing, and cut and paste | |||
Updated: 2, 2006 | Rating: 48 | Author: John Popplewell | Size: 415 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
18. | wodMailbox 2.0.7.0 (weonlydo.com) | ||
there either regular mailbox just as is used on UNIX systems (one file with full mail messages one after another) or just one message inside, just as Outlook Express saves .eml files. When you need to parse received messages, it might be hard to check all the possibilities that one simple mail message may contain. We all used to receive simple email messages - few headers | |||
Updated: 2, 2006 | Rating: 0 | Author: Kresimir Petric | Size: 821 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
19. | Windows Security Officer 6.8.1.1 (1securitycenter.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | All in One SECRETMAKER 4.2.1 (secretmaker.com) | ||
movie blocker blocks Flash ads, besides uncountable adware sources locked out. The pop-up blocker stops unwanted pop-ups, and the privacy protector hides your identity while you surf. The cookie eraser circumvents profiling. Various white lists allow user-specific optimizations. The history cleaner clears needless files, logs, and tracks. All-in-One Secretmaker is suitable for | |||
Updated: 2, 2006 | Rating: 264 | Author: secretmaker team | Size: 1249 kb | Freeware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
21. | FlowChart.NET 4.0.3 (nocache.mindfusion.org) | ||
include an alignment grid, shadow effects, scrolling and zooming, locking, z-order and pen styles. Several automatic layout algorithms, link routing and graphs analysis functions make FlowChart.NET even more useful. Diagrams can be stored in files, printed on paper, exported to image files, serialized in .NET streams such as memory buffers or network sockets. The | |||
Updated: 2, 2006 | Rating: 54 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
22. | eBooksWriter PRO 2005.15.195 (visualvision.com) | ||
VisualVision's EBooksWriter you can create ebooks with ease. It's a professional all-in-one visual environment, not just a compiler! - you build compact self extracting ebooks with one click; - one ebook, one source file. All visual, no compilation, no coding, no complications...; - no royalties: you're free to redistribute your ebook / ebrochure over the Internet | |||
Updated: 2, 2006 | Rating: 0 | Author: Aldo Ghigliano | Size: 2460 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
23. | WinLock Remote Administrator 1.22 (crystaloffice.com) | ||
remote WinLock and WinLock Professional clients via network, lock remote workstations, and apply security profiles by means of easy-to-use interface. Being a client-server application, Remote Administrator allows the administrator to control the network installations of WinLock without leaving the computer. By means of this tool, administrators can manage WinLock settings, enable | |||
Updated: 2, 2006 | Rating: 0 | Author: Denis Zolotov | Size: 2128 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
24. | WinGuard Pro 2006 Free Edition 6.0 (winguardpro.com) | ||
programs, windows and web pages in one easy to use program! What's more, there is also encrytption for your files and folders. It offers an all-in-one security solution for your computer. With extra features to lock the boot keys, task keys, software installations and internet access. This is the free edition download, however there is an option to upgrade to Premium | |||
Updated: 2, 2006 | Rating: 48 | Author: WGP Security Solutions | Size: 2454 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
25. | Windows Security Officer 6.8.1.1 (mybestsoft.com) | ||
they can do it while they have access to those resources. If a user's time limit has been set and it has been reached, the computer shuts itself off and that user can not log-on again until their permitted time range arrives. Windows Security Officer enables you to protect and totally control access to | |||
Updated: 2, 2006 | Rating: 0 | Author: Eugene Mihailov | Size: 1578 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
26. | Tray Commander 2.3 (ardamax.com) | ||
off, stand by, hibernate and reboot computer Monitor power off Lock Workstation Open favorite web pages Open or close CD tray (with automatical closing) Launch Control Panel items Open files Paste text Launch screen saver Other features: Windows 98/NT/2000/XP support Hot key editor Drag & drop support Large icons in menu support Multilingual | |||
Updated: 2, 2006 | Rating: 0 | Author: Maxim Frolov | Size: 843 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
27. | Task Commander 2.5 (resortlabs.com) | ||
well as providing one-click access to your favorite applications and files! Task Commander installs a tiny icon on your taskbar. As soon as your mouse cursor hovers over it, a menu appears containing the most popular and recently used applications that can be launched with just a click. This menu is | |||
Updated: 2, 2006 | Rating: 0 | Author: Grishin Sergey | Size: 2219 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
28. | System Mechanic Professional 6.0s (iolo.com) | ||
components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows security flaws that leave you open to attack from computer enemies such as spyware, adware, viruses, hackers, and identity thieves. Keep your System Spotless with the PC Cleanup Wizard by automatically removing all forms of | |||
Updated: 2, 2006 | Rating: 64 | Author: iolo technologies | Size: 33888 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
29. | System Mechanic 6.0s (iolo.com) | ||
accelerate, secure, and maintain your PC with System Mechanic's award-winning arsenal of powerful tools. Use the new PC Repair Wizard to automatically diagnose and fix hundreds of problems with hard drives, system components, installed software, hardware, and more. Instantly Lock Down your System with PC Security Optimizer by automatically finding and repairing Windows | |||
Updated: 2, 2006 | Rating: 45 | Author: iolo technologies | Size: 11980 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
30. | ABC Security Protector 5.23 (getfreefile.com) | ||
useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools, free downloads. This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command | |||
Updated: 2, 2006 | Rating: 39 | Author: Ixis Ltd | Size: 563 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
31. | FlowChart.NET 4.0.3 (mindfusion.org) | ||
include an alignment grid, shadow effects, scrolling and zooming, locking, z-order and pen styles. Several automatic layout algorithms, link routing and graphs analysis functions make FlowChart.NET even more useful. Diagrams can be stored in files, printed on paper, exported to image files, serialized in .NET streams such as memory buffers or network sockets. The | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 4943 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
32. | Registry First Aid 4.3.1 (rosecitysoftware.com) | ||
4.3 - It's faster, finds more problems than others and is even easier to use! People's Choice Winner 2003 Shareware Industry Conference! Tired of Windows crashing? Sick of having software lock up on you or taking forever to load? The problem could be all of those incorrect registry entries caused by software installations and un-installations that went awry! Not all | |||
Updated: 2, 2006 | Rating: 16 | Author: Konstantin Golovatsky | Size: 1739 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
33. | Access Administrator 4.14 (getfreefile.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 76 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
34. | Password Protected Lock 2.92 (softfolder.com) | ||
Protected Lock is an excellent security computer lock you can use to secure your PC and protect your privacy. It is attractive, secure, and very easy to use. It starts automatically with Windows and optionally activates desktop lock with password upon loading. It hides your desktop at the same time and provides an informative message that you can edit as you like | |||
Updated: 2, 2006 | Rating: 0 | Author: SoftFolder Inc | Size: 724 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
35. | Hide Files 3.4 (hide-files.biz) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
36. | Hide Files & Folders 2.4 (softstack.com) | ||
Files & Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password entered | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 789 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
37. | Hide Files 3.4 (spydex.com) | ||
have any files or programs that you don't want to share with other or they contain financial and tax information, passwords, personal letters and emails, private images, and other confidential or personal data. But typically, computer files and folders have not security protection so the best | |||
Updated: 2, 2006 | Rating: 0 | Author: Eric Nilsson | Size: 234 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | File & Folder Protector 2.33 (softheap.com) | ||
Files and Folders is a great easy-to-use password-protected security utility working at Windows kernel level you can use to password-protect certain files and folders, or to hide them securely from viewing and searching just with a click of mouse. Upon accessing any protected file or folder, dialog box querying password appears on the screen. If valid password | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 740 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
39. | Evidence Exterminator 2.14 (softstack.com) | ||
information. Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 984 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
40. | EF Duplicate Files Manager 3.21 (efsoftware.com) | ||
EF Duplicate Files Manager is a useful program that help you to find out and remove duplicate files with same name, same size, same content on specify paths, files that occupy so unnecessarily storage place on your computer or your server. You can let the program work in several ways. In | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1854 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
41. | Easy File Protector 4.14 (softstack.com) | ||
File Protector is a very flexible password protected security utility that restricts access to your files and folders by user-defined time schedule. You choose users, define restricted files/folders and time periods for them, and activate the program. After that, your system disables/enables your files automatically depending on current time and user. Protection | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
42. | Easy Desktop Keeper 1.63 (softheap.com) | ||
Desktop Keeper gives you the ability to save, restore, manage and lock your desktop layout including files and folders located on your desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout, every time you reboot your PC, the | |||
Updated: 2, 2006 | Rating: 68 | Author: Ixis Ltd | Size: 841 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
43. | Dr.Salman's Window Power Tools 5.0-2005R1 (dmisoftware.com) | ||
by four times. It also cleans your hard drive, searches for garbage files and cleans them, decreases window crashes by 80-90%, provides a memory monitor, recovers precious wasted RAM to give your system the just booted feeling. It will keep your system running as smoothly as possible. Another amazing | |||
Updated: 2, 2006 | Rating: 39 | Author: Dr.Salman Zafar | Size: 5525 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
44. | Easy Desktop Keeper 1.63 (getfreefile.com) | ||
Desktop Keeper gives you the ability to save, restore, manage and lock your desktop layout including files and folders located on your desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout, every time you reboot your PC, the | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 841 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
45. | CD-DVD Lock 2.01 (getfreefile.com) | ||
Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain access to your devices back by entering a valid password that only you know | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
46. | CD-DVD Lock 2.01 (softheap.com) | ||
Lock is intended for restricting read or write access to removable media devices such as CD, DVD, floppy and flash, as well as for restricting access to certain partitions of hard disk drives. You can restrict access by two ways: hide your devices from viewing or lock access to them. You can gain access to your devices back by entering a valid password that only you know | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 822 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
47. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 24 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
48. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 39 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
49. | Backup4all 3.0 (backup4all.com) | ||
removable media (such as USB drives). Backup4all can backup open/locked files and it can perform full, differential, incremental and mirror backups. When defining a backup you can also set file filters and schedule the backup for automatic execution. Once a backup is performed, you can see what files have been changed since the last backup or you can read the | |||
Updated: 2, 2006 | Rating: 0 | Author: Softland Softland | Size: 5772 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
50. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
and optimization utility to tune up windows performance. Remove junk files and zero size files to save valuable disk space; Registry Cleaner, to prevent application crashes;backup and restore backup; popup killer; Startup Manager, to prevent spy applications from running behind your back; erase | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
51. | Advanced Desktop Shield 1.63 (softstack.com) | ||
and desktop layouts of your users. Desktop layouts are saved to files, which include all files and folders located on the desktop, placement of desktop icons, desired wallpaper and screen saver. If you choose to lock your desktop layout or desktop layouts of your users, every time you or your users reboot your PC, the program will return everything on the desktop back | |||
Updated: 2, 2006 | Rating: 99 | Author: IM Soft | Size: 833 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
52. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your monitor and he has it all! Introducing Active Screen Lock, the unique security application by DMVSoft, allowing you to do whatever you want to do when you are away from the computer without having to worry a second. Active Screen Lock operates as | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
53. | Active Backup Expert 1.92 (backuptool.com) | ||
easily mastered tool maintains backups of files in zip or cab format on hard and removable disks (CD, Zip drives etc.), in a LAN or WAN. A Wizard guides you through the steps of the backup-set creation: supplying the paths and filters for the included and excluded files, specifying the storage | |||
Updated: 2, 2006 | Rating: 16 | Author: Andrey Panichkin | Size: 1531 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
54. | Active Backup Expert Pro 1.92 (backuptool.com) | ||
creates automated zip- or cab-format backups of local and network files on hard disks, CDs and other removable devices, local network or FTP site. A Wizard guides you through the steps of the backup-set creation: selecting the folders and filters for included and excluded files, specifying the | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Panichkin | Size: 2582 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
55. | Access Administrator 4.14 (softheap.com) | ||
your files and restrict other users from being able to start, see, change or delete them. File protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
56. | Access Administrator Pro 4.14 (getfreefile.com) | ||
Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 34 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
57. | Access Administrator Pro 4.14 (softheap.com) | ||
Administrator Pro is intended for controlling access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level. It enables you to deny access to certain files and folders, or to hide them securely from viewing and searching. An easy-to-use user interface gives you a lot of abilities to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
58. | ABC Security Protector 5.23 (softheap.com) | ||
useful if you want to disable the lowlevel access to your system. It's easy to use, excellent online help is also available. Try our password and security tools, free downloads. This nice free security utility enables you to protect your PC by disabling some features like: use of the MS-DOS command | |||
Updated: 2, 2006 | Rating: 16 | Author: Ixis Ltd | Size: 563 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
59. | 1st Security Agent Pro 6.14 (softheap.com) | ||
from editing your Favorites, disable downloading and installing files from the Internet, disable individual tabs in the Internet Options dialog, as well as specific settings from each tab. 1st Security Agent Pro allows you to import and export PC security settings, and offers a flexible and complete password protection. The program is very easy-to-use, excellent online help is | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd | Size: 1105 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | 1st Screen Lock 6.14 (softheap.com) | ||
Screen Lock is a password-protected desktop security utility that lets you lock your desktop with a password on boot, or at the time you are leaving your PC. You can use the built-in spy utility that works in background and enables you to spy on your PC users by fixing all user moves in a log | |||
Updated: 2, 2006 | Rating: 479 | Author: Ixis Ltd | Size: 1106 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
61. | 1st Evidence Remover 2.14 (getfreefile.com) | ||
you use Windows, open folders, search for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the | |||
Updated: 2, 2006 | Rating: 190 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
62. | 1st Evidence Remover 2.14 (softheap.com) | ||
you use Windows, open folders, search for files and see pictures, work with different software, use the Internet and online banking to access your accounts, information about all your steps is stored in various files and in the registry. This fact often results in security threat you may face because all pictures you have seen, all passwords and bank accounts you use and the | |||
Updated: 2, 2006 | Rating: 48 | Author: Ixis Ltd | Size: 1177 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
63. | 1 Click & Go 1.275 (softstack.com) | ||
as a Windows toolbar designed for easy access, open and execute files and folders that you often use. Program similar well-known Microsoft Office Panel, but not lose configuration in case of a system crash. It supports the Drag&Drop and has a simple and comprehensible interface. There is a multi-user mode - some user can have its own set of program. This set is protected with a | |||
Updated: 2, 2006 | Rating: 0 | Author: IM Soft | Size: 302 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
64. | X2Net WebCompiler 3.0.0.49 (x2net.com) | ||
powerful HTML Compiler produces .exe files for distribution from groups of HTML pages. Built-in ultra fast searching, favorites and history management, page protection, passwords, kiosk mode,form processing etc. Built-in installer/uninstaller, powerful encrytion. System locking to restrict | |||
Updated: 2, 2006 | Rating: 0 | Author: X2Net Staff | Size: 4957 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
65. | Watch Right 2002.0.77 (bpssoft.com) | ||
concerned parent with the ability to "keep an eye" on their child's online activities. Automatically log your child's instant messages, chatroom conversations, email messages, message board postings, and web sites they visit while online. В Watch Right is designed to work invisibly in the | |||
Updated: 2, 2006 | Rating: 0 | Author: Bradley O'Keefe | Size: 2842 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
66. | SourceGuardian PHP Encoder 5.5 (sourceguardian.com) | ||
Main feature list: + Full Bytecode Encryption - protect your files by removing the original PHP Source Code + Fully encode and deploy for PHP5 (and PHP4) + Choice of Windows/Linux/Mac OS X encoding clients + Command line encoder available now + Encrypt to domain name + Encrypt to IP + License generator for encoded scripts + Easy to use Wizard interface and | |||
Updated: 2, 2006 | Rating: 174 | Author: Sales Department | Size: 3580 kb | Demo Go to category: Web Development > ASP & PHP Similar programs | |||
67. | Private Shell SSH Client 2.1 (privateshell.com) | ||
CVS, VNC, e-mal clients and other software). Private Shell's default configuration allows you to connect to any SSH1 or SSH2 server in the most secure way by choosing the strongest encryption algorithms supported by a remote computer. Full support for ssh tunneling and X11 forwarding. Use built-in Secure FTP client (SFTP client) to transfer files between computers | |||
Updated: 2, 2006 | Rating: 0 | Author: TB Labs | Size: 2429 kb | Shareware Go to category: Network & Internet > Terminal & Telnet Clients Similar programs | |||
68. | Hyper Maker HTML 3000.27 (bersoft.com) | ||
pages, linked images, and sounds in a single, encrypted, compressed file. Your creations can include .gif, .bmp, .jpg, and .png graphics; .avi movies; TrueType fonts; and .wav and .mid sound files. A royalty-free setup/viewer program (with a Web browser look-and-feel and multilanguage support) | |||
Updated: 2, 2006 | Rating: 0 | Author: Daniel Bernardo | Size: 2606 kb | Shareware Go to category: Network & Internet > Browser Tools Similar programs | |||
69. | G-Lock Email Processor 1.98 (glocksoft.com) | ||
any data from the message body and message header and save it to a file of user definable format. Using Email Processor you are also able to send a text or HTML message to your recipients as well as forward the message you received to another email address. The program can be easily set up to | |||
Updated: 2, 2006 | Rating: 119 | Author: Alex Markov | Size: 2601 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
70. | G-Lock EasyMail Professional 4.62 (glocksoft.com) | ||
and subject lines via its powerful mail-merge function. EasyMail Pro's distinctive voicemail capability also lets you add audio content to your messages. Supporting a wide range of compression formats, you can even set the recording to start playing when the mail is opened. HTML and Multi part (MIME) | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3324 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
71. | G-Lock EasyMail 4.62 (glocksoft.com) | ||
G-Lock EasyMail was developed to help people run and manage mailing lists, newsletters, announcement lists and customer updates. G-Lock EasyMail is a powerful group mailer which sends your message directly from your outbox to the recipient's mail server (without using any ISP's SMTP server). Program supports multi-threaded delivery, and so works several times | |||
Updated: 2, 2006 | Rating: 0 | Author: Alex Markov | Size: 3281 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
72. | Easy File & Folder Protector 4.14 (softstack.com) | ||
files and folders situated on local media of Windows 95/98/ME/NT/2000/XP with Easy File & Folder Protector at Windows kernel level. Your can deny access to certain files and folders, or to hide them securely from viewing and searching. Easy File & Folder Protector has an easy-to-use user interface allowing you to allocate access to your files and folders | |||
Updated: 2, 2006 | Rating: 46 | Author: IM Soft | Size: 736 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
73. | Atomic Newsgroup Explorer 1.40 (atompark.com) | ||
list of e-mail addresses using ANE! The list can be saved to a file, Windows Clipboard or MS Word or MS Excel application. Atomic Newsgroup Extractor does not depend upon any additional software the way many email grabbers depend on third-party libraries. The most important feature of ANE is an availability to work with private newsgroups locked by password and servers | |||
Updated: 2, 2006 | Rating: 42 | Author: Evgeny Medvednicov | Size: 1175 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
74. | Advanced Email Verifier 5.15 (glocksoft.com) | ||
Text (.CSV), HTML, Word, Lotus 1-2-3, QuattroPro, XML, MS Access files, and DBISAM tables (.dat files). You can also connect to the database on your disk and verify the email addresses directly from the database. AEV helps you maintain your mailing list clean and decrease the Internet traffic keeping you from sending undeliverable messages that cause a ping-pong of useless | |||
Updated: 2, 2006 | Rating: 42 | Author: Alex Markov | Size: 4148 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
75. | FlowChartX control 4 (mindfusion.org) | ||
include an alignment grid; shadow effects; scrolling and zooming; locking; z-order; and pen styles. Diagrams can be printed, exported as image files, stored in OLE compound documents or in separate documents. The control's programming model comprises more than 600 methods, properties, and events. Full source code is available for purchase too, giving you unlimited | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 3787 kb | Commercial Go to category: Development > Active X Similar programs | |||
76. | FlowChartX control 4 (nocache.mindfusion.org) | ||
include an alignment grid; shadow effects; scrolling and zooming; locking; z-order; and pen styles. Diagrams can be printed, exported as image files, stored in OLE compound documents or in separate documents. The control's programming model comprises more than 600 methods, properties, and events. Full source code is available for purchase too, giving you unlimited | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 3787 kb | Commercial Go to category: Development > Active X Similar programs | |||
77. | FlowChartX control 4 (mindfusion.org) | ||
include an alignment grid; shadow effects; scrolling and zooming; locking; z-order; and pen styles. Diagrams can be printed, exported as image files, stored in OLE compound documents or in separate documents. The control's programming model comprises more than 600 methods, properties, and events. Full source code is available for purchase too, giving you unlimited | |||
Updated: 2, 2006 | Rating: 0 | Author: MindFusion Ltd. | Size: 3787 kb | Commercial Go to category: Development > Active X Similar programs | |||
78. | TurboNote+ desktop sticky notes v6.0 (turbonote.com) | ||
Web and email addresses. Change note colors and sizes, set alarms, lock them and keep your screen uncluttered by hiding them. Use handy templates for common messages or make up your own style with optional rich text editing, transparency control and images. TurboNotes stay around when you turn your | |||
Updated: 2, 2006 | Rating: 173 | Author: Vicki Hyde | Size: 1616 kb | Shareware Go to category: Business > Other Similar programs | |||
79. | Time & Chaos 6.0.4.5 (chaossoftware.com) | ||
use the same databases at the same time to collaborate without being locked out or requiring expensive server software. Appointments on your calendar and to do items on your task list can be linked back to the matching contact in your telephone book to help you keep a complete contact history of every | |||
Updated: 2, 2006 | Rating: 0 | Author: Bill Tiede | Size: 4171 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
80. | eBooksWriter PRO 2005.15.195 (visualvision.com) | ||
VisualVision's EBooksWriter you can create ebooks with ease. It's a professional all-in-one visual environment, not just a compiler! - you build compact self extracting ebooks with one click; - one ebook, one source file. All visual, no compilation, no coding, no complications...; - no royalties: you're free to redistribute your ebook / ebrochure over the Internet | |||
Updated: 2, 2006 | Rating: 89 | Author: Aldo Ghigliano | Size: 2460 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
81. | AudioLabel CD/DVD Labeler 3.20 (audiolabel.com) | ||
from the Freedb internet database, CD-Text and CDPlayer.ini file. Our cd label creator can even read and label your MP3 CDs using the ID3 tag and filename. Unlike other cd labeling software, you'll never be locked into a particular brand of label paper. All popular brands are supported and even non-standard labels can be adjusted using the "Label Alignment Wizard" | |||
Updated: 2, 2006 | Rating: 228 | Author: Cripple Creek Software | Size: 3870 kb | Shareware Go to category: Audio & Multimedia > Other Similar programs | |||
82. | NotesPlusPlus 5.5 (notesplusplus.com) | ||
any computer sticky note; organize sticky notes in groups, attach files/urls to sticky notes; associate virtual sticky notes with files; modify all sticky note settings; set up default settings for newly created notes; accelerate work using hotkeys; lock sticky notes to prevent unauthorized use; import *.txt and *.rtf files to sticky notes; save sticky notes in | |||
Updated: 9, 2005 | Rating: 0 | Author: NotesPlusPlus. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
83. | Sticky Notes Std 5.0 (morun.net) | ||
in groups, send sticky notes over LAN/Internet or via e-mail, attach files/urls to sticky notes, lock sticky notes to prevent unauthorized use, import .txt and .rtf files to sticky notes, save sticky note in *.txt, *.rtf formats; save sticky note as pictures (*.jpg, *.bmp formats) | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. net | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
84. | MoRUN.net Sticker 5.0 (morun.com) | ||
in groups, send sticky notes over LAN/Internet or via e-mail, attach files/urls to sticky notes, lock sticky notes to prevent unauthorized use, import .txt and .rtf files to sticky notes, save sticky note in *.txt, *.rtf formats; save sticky note as pictures (*.jpg, *.bmp formats) | |||
Updated: 9, 2005 | Rating: 0 | Author: MoRUN. com | Size: 1400 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
85. | CryptArchiver 1.2.1.0 (winencrypt.com) | ||
really easy to hide, encrypt and password protect data with CryptArchiver. All you do is drag-and-drop your important files and folders into an encrypted drive - just like an ordinary drive! CryptArchiver has an intuitive and easy-to-use interface. CryptArchiver Lite is encryption software for the desktop. It creates a special Encrypted Drive that can only be accessed with | |||
Updated: 9, 2005 | Rating: 27 | Author: WinEncrypt | Size: 1524 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
86. | CleanMantra 3.0 (pcmantra.com) | ||
CleanMantra shreds files which compromise privacy, cleans all traces of Online Activities as well as Offline Activities through effortless, secured, user-friendly options. Increases efficiency of PC by permanently cleaning useless files through Shred Function. It enables trouble free browsing by preventing IE Browser Home Page Hijacking. Full Proof Scheduling of | |||
Updated: 9, 2005 | Rating: 0 | Author: PC Mantra | Size: 656 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
87. | LoanAmortizer Standard Edition 3.1 (loanamortizer.com) | ||
Once any amortization schedule is prepared it can be saved in a file for future reference, comparison or archive. Everything is completed automatically, accurately and is easy and simple to be used and handled. Canadian Mortgage calculations are also implemented in LoanAmortizer Standard Edition, both for mortgage and regular loans. LoanAmortizer Standard Edition is one of the few | |||
Updated: 9, 2005 | Rating: 0 | Author: George Athannassov | Size: 1407 kb | Shareware Go to category: Business > Other Similar programs | |||
88. | TurboNote 3.4 (turbonote.com) | ||
change note colours and sizes, have them ring alarms, print them, lock them and keep your screen uncluttered by hiding them. Notes even stay around when you turn your computer off. TurboNote's Quick Launch feature also lets you open Web addresses, programs and files which appear in notes, simply by double-clicking. Network support suits organisation-wide deployment and | |||
Updated: 9, 2005 | Rating: 1234 | Author: Peter Hyde | Size: 542 kb | Freeware Go to category: Business > Other Similar programs | |||
89. | RegDesk 4.0 4.0 (easytools.com) | ||
answer to a lock and key? RegDesk 4.0 provides computer security of the highest order, securing opted devices and areas of Desktop and Windows programs. Put together a foolproof desktop security system, which controls access to vital areas of Windows. It provides a facility for hiding of selected drive letters, setting virtual memory, display, network, printer | |||
Updated: 9, 2005 | Rating: 0 | Author: VenkataRangan TNC | Size: 530432 kb | Shareware Go to category: Development > Other Similar programs | |||
90. | 12Ghosts Wash 7.10 (12ghosts.com) | ||
information. Removes history, cookies, temporary cached files, and the typed-address list of Internet Explorer, AOL, MSN, Netscape Navigator, and Opera. Many Windows options, as well as most-recently-used menus are wiped. It even deletes locked files (files that are in use, for example those ominous "index.dat" files). 12-Wash queues deletion for | |||
Updated: 9, 2005 | Rating: 232 | Author: Philip Ahrens | Size: 1500 kb | Freeware Go to category: Home & Hobby > Other Similar programs | |||
91. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
files, drag and shred, DoD conform, Wipe Disk. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover files from your disk! Nobody will even find out the previous name or file size. The file can be overwritten several times with random bits so that even the | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
92. | Picture and Video Encrypt 2.03b (softdd.com) | ||
software will allow you to prevent access by encrypting any media files, and will even disguise the names of the videos or pictures so they cannot be recognized by anyone else. You can easily decrypt and return the files back to normal with the click of a button, and even the file names will return to your original file name. This software is also password | |||
Updated: 9, 2005 | Rating: 42 | Author: SoftDD Software | Size: 576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
93. | web based msde dba tool - Shusheng SQL Tool 1.0 (websqltool.com) | ||
Jobs, Job Steps and Schedules. o Monitor connections, locks and performance of SQL server. Kill bad process. o Administrate security for server logins (Windows and SQL accounts), database users and roles. o Assign permission to user(s), role(s), object(s). Support column level permission. o Backup, Restore and Repair database. Compress Transaction | |||
Updated: 9, 2005 | Rating: 0 | Author: Shusheng Zhou | Size: 819 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
94. | fsMechanic 1.1 (freewebs.com) | ||
fsMechanic recovers deleted files and gains access to the NTFS partitions under Windows 9x. - fsMechanic uses original algorithms to recover deleted files. - fsMechanic is a tool that allows you to work with disk images just as existing disks. fsMechanic features: Well-known "Explorer" | |||
Updated: 9, 2005 | Rating: 16 | Author: Alexey Babenko | Size: 438 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
95. | GiPo@FileUtilities 2.9 (gibinsoft.net) | ||
services: GiPo@MoveOnBoot - copying/moving/renaming/deleting files and folders on the next system boot. GiPo@DirMonitor - monitoring changes in the file system. GiPo@Mount - local folders substitution and local/remote drives mounting. GiPo@ReadTest - checking files and folders for read errors. Utilities can be integrated into shell. GiPo@MoveOnBoot | |||
Updated: 9, 2005 | Rating: 0 | Author: Igor Artemov | Size: 867 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
96. | Zip Backup to CD 3.18 (zip-backup.com) | ||
Backup to CD is designed to backup your data files using the standard Zip file format, allowing backup files to be viewed and restored with most zip file utilities. Zip Backup to CD distributes the files to be backedup in several stand alone Zip files of a size fitting a standard CD (CD-R) or a size chosen by the user and writes it to CD/DVD | |||
Updated: 9, 2005 | Rating: 16 | Author: Rene Mogensen | Size: 946 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
97. | PowerControl 1.0 (onlimemedia.com) | ||
will allow you to make Shutdown, Reboot, Hibrnete, Logoff, Standby, Lock the local or removed computer (or several computers). As you may may awake the removed computer with the help of function Wake-On-LAN. You can specify a delay, which can either be an absolute time (eg. 8pm) or a relative time (eg. "20 minutes from now"), during which a message you specify can be displayed | |||
Updated: 9, 2005 | Rating: 20 | Author: Pavel Abraksas | Size: 1434 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
98. | SecurDesk! 5.32 (cursorarts.com) | ||
a complete replacement for the Windows default Explorer.exe desktop/file manager shell. SecurDesk! Features Include: a desktop interface which can be custom designed; Logging of system usage; Enhanced file management with optional restrictions; Virtual desktops; Data protection with | |||
Updated: 9, 2005 | Rating: 0 | Author: CursorArts Company | Size: 7036 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
99. | xReminder Pro 4.2 (xreminder.com) | ||
and Swatch Internet Time. It also can synchronize your computer's clock with Atomic Time Servers. The program also has some useful features like stopwatches and countdown timers. Other options include: smart import-export of data in native and commonly used file formats, pop-up calendar that easy to access from clock or from the system tray, print preview, and more! xReminder | |||
Updated: 9, 2005 | Rating: 0 | Author: Vladimir Kulemin | Size: 1780 kb | Shareware Go to category: Business > PIMS & Calendars Similar programs | |||
100. | Clipboard Express 3.2.7 (cheqsoft.com) | ||
Tray Iconic left and right click functioning Displays the clipboard's contents for easy reference. Counts characters in the clipboard memory automatically - just click the form and it does the rest! Use Clipboard Express Pro as temporary or permanent storage. Includes 150 storage locations. Each | |||
Updated: 9, 2005 | Rating: 0 | Author: David Hingston | Size: 3845 kb Go to category: System Utilities > Clipboard Tools Similar programs | |||
|
Home > Lock file software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|